Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.
References
Link | Resource |
---|---|
https://blog.torproject.org/blog/tor-0309-released-security-update-clients | Release Notes Vendor Advisory |
https://blog.torproject.org/blog/tor-0314-alpha-released-security-update-clients | Release Notes Vendor Advisory |
https://github.com/torproject/tor/commit/665baf5ed5c6186d973c46cdea165c0548027350 | Patch Third Party Advisory |
https://security-tracker.debian.org/CVE-2017-0377 | Third Party Advisory |
https://trac.torproject.org/projects/tor/ticket/22753 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-07-02 15:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-0377
Mitre link : CVE-2017-0377
CVE.ORG link : CVE-2017-0377
JSON object : View
Products Affected
torproject
- tor
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor